과제정보
이 논문은 2024 년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구이며 (IITP-2023-RS-2023-00256081), 2024 년도 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구이며 (RS-2023-00277326), 2024 년도 BK21 FOUR 정보기술 미래인재 교육연구단에 의하여 지원되었음. 이 논문은 2024 년도 정부(산업통상자원부)의 재원으로 한국산업기술기획평가원의 지원을 받아 수행된 연구임.(No. RS-2024-00406121, 자동차보안취약점기반위협분석시스템개발(R&D)). 이 논문은 2024 년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구 결과임(No.RS-2024-00438729, 익명화된 기밀실행을 이용한 전주기적 데이터 프라이버시 보호 기술 개발). 본 연구는 반도체 공동연구소 지원의 결과물임을 밝힙니다. 이 연구를 위해 연구장비를 지원하고 공간을 제공한 서울대학교 컴퓨터연구소에 감사드립니다.
참고문헌
- Yao, Andrew Chi-Chih. "How to generate and exchange secrets." 27th annual symposium on foundations of computer science (Sfcs 1986). IEEE, 1986.
- Carter, Henry, Charles Lever, and Patrick Traynor. "Whitewash: Outsourcing garbled circuit generation for mobile devices." Proceedings of the 30th Annual Computer Security Applications Conference. 2014.
- Carter, Henry, et al. "Secure Outsourced Garbled Circuit Evaluation for Mobile Devices." 22nd USENIX Security Symposium (USENIX Security 13). 2013.
- Blanton, Marina, and Fattaneh Bayatbabolghani. "Efficient server-aided secure two-party function evaluation with applications to genomic computation." Proceedings on Privacy Enhancing Technologies (2016).
- Kamara, Seny, Payman Mohassel, and Ben Riva. "Salus: a system for server-aided secure function evaluation." Proceedings of the 2012 ACM conference on Computer and communications security. 2012.
- Baldimtsi, Foteini, et al. "Server-aided secure computation with off-line parties." Computer Security- ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I 22. Springer International Publishing, 2017.
- Wu, Yulin, et al. "Efficient server-aided secure two-party computation in heterogeneous mobile cloud computing." IEEE Transactions on Dependable and Secure Computing 18.6 (2020): 2820-2834.
- Liu, Zhusen, et al. "Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks." IEEE Transactions on Industrial Informatics (2024).
- Lindell, Yehuda, and Benny Pinkas. "An efficient protocol for secure two-party computation in the presence of malicious adversaries." Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20- 24, 2007. Proceedings 26. Springer Berlin Heidelberg, 2007.
- Wang, Xiao, Samuel Ranellucci, and Jonathan Katz. "Authenticated garbling and efficient maliciously secure two-party computation." Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. 2017.
- Katz, Jonathan, et al. "Optimizing authenticated garbling for faster secure two-party computation." Advances in Cryptology-CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III 38. Springer International Publishing, 2018.